Module 5 / Unit 3 Installing Wireless Networks Flashcards

On completion of this unit, you will be able to: □ Distinguish between different IEEE 802.11 Wi-Fi standards and topologies. □ Perform a site survey and understand issues impacting on site design. □ Troubleshoot wireless connectivity, configuration, and security issues.

1
Q

What mechanism does RTS/CTS support?

A

Collision avoidance (CSMA/CA). Rather than try to detect collisions, a wireless station indicates its intent to transmit by broadcasting a Request To Send (RTS) and waits to receive a Clear To Send (CTS) before proceeding.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which IEEE WLAN standards specify a data transfer rate of up to 54 Mbps?

A

802.11a and 802.11g.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What options may be available for an 802.11n network that are not supported under 802.11g?

A

Channel bonding, Multiple-Input-Multiple-Output (MIMO), and use of either 2.4 GHz or 5 GHz frequency bands.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

True or false? Stations with 802.11ac capable adapters should be assigned to the 5 GHz frequency band.

A

True - 802.11ac is designed to work only in the 5 GHz frequency band with the 2.4 GHz band used for legacy clients.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a BSSID?

A

The MAC address of an access point (or a random address in the case of ad hoc WLANs).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the advantages of deploying a wireless mesh topology over an ad hoc one?

A

Stations in a Wireless Mesh Network are capable of discovering one another, forming peering arrangements, and performing path discovery and forwarding between peers (routing).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

True or false? Suppressing transmission of the WLAN beacon improves security.

A

False - the beacon cannot be suppressed completely. Increasing the broadcast interval reduces network overhead but increases the time required to find and connect to the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What constraints should you consider when planning the placement of an access point?

A

Range, interference and obstructions, number of clients (device density and bandwidth requirements), and access to a network port and power supply.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is beamforming?

A

Beamforming or Multiuser MIMO (MU-MIMO) is a means of performing primitive switching with an access point. The AP can send a signal more strongly to clients positioned along different axes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which frequency band is less likely to suffer from co-channel interference?

A

The 5 GHz band.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a heat map?

A

A site survey plotting the strength of wireless signals in different parts of a building.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Widget Corporation has provided wireless access for its employees using several access points located in different parts of the building. Employees connect to the network using 802.11g-compatible network cards. On Thursday afternoon, several users report that they cannot log on to the network. What troubleshooting step would you take first?

A

Check whether the problem machines are trying to utilize the same access point.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Your office block is hosting a conference event. During the morning coffee break, several guests report that they cannot access their webmail. What is the likely cause?

A

Device saturation - the access point is likely to be experiencing greater load than usual and cannot cope with the volume of requests.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the main difference between WPA and WPA2?

A

WPA2 supports a stronger encryption algorithm, based on AES.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Why might an attacker launch a jamming attack against a wireless access point?

A

This could be a simple Denial of Service (DoS) attack but the attacker could also be attempting to use an evil twin / rogue AP to intercept network traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What type of access point is designed to work with a wireless controller?

A

A Lightweight or Thin access point (or one working in thin mode).